Tip:
Highlight text to annotate it
X
(Music)
Enterprise reliance on high-performance private networks
and internet connectivity is growing at double digit rates
Hi, I'm Jarad Carleton, principle consultant with Frost & Sullivan's Growth Consultant team.
Maintaining always on availability with high speed data exchanges and protection can be difficult.
In a survey of over 12,000 professionals, over two-thirds view application vulnerabilities
malware and mobile devices as huge security concerns
Security must always be a high priority, because when it isn't, the probability of a
successful attack that dramatically impacts both public and internal operations increases significantly.
Network operators, providers, collaboration services and enterprises
must practice security effectively, they to also need to be coordinated and cost-effective.
Network operators are continuously gathering information on everything, from network traffic to volume.
Analysis on this rich-full of information provides clues on attack vectors
and feeds proactive security measures. Network traffic flow data
can identify hacker activities and close vulnerabilities before a devastating attack occurs
At the network services layer, service providers are best positioned to build
and maintain the service architectures that provide user privacy and protection from service disruption attacks.
By following best practices and segmentation, access control and authentication.
Service providers thwart would be attackers and isolate the customers from disruptions.
The critical role for an enterprise is to define security policies that are tailored for its
specific needs. These policies should reflect a balance between flexibility
and the level of acceptable risk that an enterprise chooses for their network operations.
An example of coordination is in defending against distributed denial-of-service, or DDoS attacks.
The objective of a DDoS attack is to flood the bandwidth resources of the target to render it unavailable
however, care must be used in mitigating DDoS attacks to
avoid adversely impacting legitimate users of the site. To accomplish this
the services provider and the site coordinator work together
to develop a tactical plan defining each mitigation step
and a critical piece of the plan is to outline
communications protocol before an attack occurs. As each mitigation step is considered both sides of the equation
mitigating the attack and servicing legitimate users
are taken into account. Provider atributes to look for include
a global threat sensing network that is supported by a well-trained staff
of security professionals that are on the job around-the-clock
also the provider's network services should be designed
and extensively tested to ensure the highest levels
of attack defense is possible. Enterprises gain assurances that
end-to-end comprehensive and tightly coordinated security is in place and operational
which is always a necessity in today's connected world
(Music)